Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VoIP
biblio
Blockchain Based Mutual Authentication for VoIP Applications with Biometric Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 1:14pm
authentication
Biological system modeling
biometrics (access control)
blockchain
blockchains
Elliptic curve cryptography
encryption
P2P network
privacy
pubcrawl
resilience
Resiliency
Scalability
secure communication
signature based defense
VoIP
biblio
Discord Server Forensics: Analysis and Extraction of Digital Evidence
Submitted by grigby1 on Mon, 01/31/2022 - 5:43pm
Computer crime
VoIP
discord server
discord
cache storage
cache analysis
Web Caching
forensic analysis
Data mining
tools
Scalability
Resiliency
resilience
Metrics
pubcrawl
Digital Forensics
Servers
security
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets
Submitted by aekwall on Mon, 08/05/2019 - 10:35am
blacklisting
cdr mining
composability
expandability
machine learning
pubcrawl
Resiliency
telephone spam
VoIP
biblio
Research on Parallel Dynamic Encryption Transmission Algorithm on VoIP
Submitted by aekwall on Wed, 05/01/2019 - 1:04pm
Dynamical Systems
VoIP
parallel dynamic encryption algorithm
complexity
Metrics
composability
pubcrawl
Resiliency
security
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Submitted by grigby1 on Tue, 05/01/2018 - 11:32am
composability
covert channel
Information hiding
Metrics
privacy
pubcrawl
Steganography
steganography detection
voice activity detection
VoIP
biblio
SkypeLine: Robust Hidden Data Transmission for VoIP
Submitted by grigby1 on Tue, 05/16/2017 - 12:26pm
censorship circumvention
composability
covert communication
deep packet inspection
DSSS
Metrics
pubcrawl
Scalability
Steganography
steganography detection
VoIP
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
Analysis of a #x201c;/0 #x201d; Stealth Scan From a Botnet
Submitted by BrandonB on Wed, 05/06/2015 - 10:22am
animation
botnet
Communication system security
darknet
Geology
internet
Internet background radiation
Internet telephony
IP networks
network probing
Network Telescope
Ports (Computers)
scanning
Servers
Telescopes
VoIP
1
2
next ›
last »